dc.contributor.advisor | Briceño Pineda, Wilson | spa |
dc.contributor.advisor | Parra Valencia, Jorge Andrick | spa |
dc.contributor.author | Niño Díaz, Angélica María | spa |
dc.contributor.author | Guerrero, Cesar D. | spa |
dc.coverage.spatial | Bucaramanga (Santander, Colombia) | spa |
dc.coverage.temporal | 2014 | spa |
dc.date.accessioned | 2021-03-02T15:00:18Z | |
dc.date.available | 2021-03-02T15:00:18Z | |
dc.date.issued | 2014-10-28 | |
dc.identifier.isbn | ISBN: 978-958-8166-65-0 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12749/12349 | |
dc.description.abstract | Los ataques de denegación de servicio han tenido una sofisticación cada vez mayor que exige nuevas soluciones por parte de la comunidad científica. Los sistemas de detección de intrusiones utilizan técnicas de detección regulares al inspeccionar los encabezados de los paquetes IP entre diferentes reglas para cada tipo de ataque. Un enfoque más simple presentado en este documento se basa en la estimación del ancho de banda disponible como una métrica para determinar la variación inesperada en el consumo de ancho de banda como un indicador de un posible ataque DoS. Utilizando una versión modificada de la herramienta Traceband, mostramos que es posible identificar diferentes tipos de ataques de inundación implementando criterios de acuerdo con los estados del Modelo Oculto de Markov utilizado para establecer valores de estimación de ancho de banda disponible. | spa |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | spa | spa |
dc.relation.uri | http://hdl.handle.net/20.500.12749/12263 | |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/2.5/co/ | * |
dc.source | Colección de investigaciones en innovación y apropiación de las tecnologías de la información y las comunicaciones CIINATIC 2014 | |
dc.source | Colección de investigaciones en innovación y apropiación de las tecnologías de la información y las comunicaciones CIINATIC 2014; Volumen 1 (2014); páginas 137-142 | |
dc.title | Detección de ataques de denegación de servicio basada en la estimación del ancho de banda disponible | spa |
dc.title.translated | Denial of service attacks detection based on available bandwidth estimation | spa |
dc.publisher.grantor | Universidad Autónoma de Bucaramanga UNAB | spa |
dc.rights.local | Abierto (Texto Completo) | spa |
dc.publisher.faculty | Facultad Ingeniería | spa |
dc.publisher.program | Pregrado Ingeniería de Sistemas | spa |
dc.type.driver | info:eu-repo/semantics/conferenceProceedings | |
dc.type.local | Memoria de eventos | spa |
dc.type.coar | http://purl.org/coar/resource_type/c_f744 | |
dc.subject.keywords | DoS | eng |
dc.subject.keywords | Available bandwidth estimation | eng |
dc.subject.keywords | Detection denial of service attacks | eng |
dc.subject.keywords | Network monitoring | eng |
dc.subject.keywords | Traceband | eng |
dc.subject.keywords | Engineering in Computer Science | eng |
dc.subject.keywords | Document management | eng |
dc.subject.keywords | Education | eng |
dc.subject.keywords | Business | eng |
dc.subject.keywords | Engineering education | eng |
dc.identifier.instname | instname:Universidad Autónoma de Bucaramanga - UNAB | spa |
dc.identifier.reponame | reponame:Repositorio Institucional UNAB | spa |
dc.type.hasversion | info:eu-repo/semantics/acceptedVersion | |
dc.rights.accessrights | info:eu-repo/semantics/openAccess | spa |
dc.rights.accessrights | http://purl.org/coar/access_right/c_abf2 | spa |
dc.relation.references | D. Kaur and M. Sachdeva, “Study of Recent DDoS Attacks and Defense Evaluation Approaches,” ijetae.com, vol. 3, no. 1, pp. 332–336, 2013. | spa |
dc.relation.references | S. Ning and Q. Han, “Design and implementation of DDoS attack and defense testbed,” pp. 220–223, 2012. | spa |
dc.relation.references | D. Kaur, M. Sachdeva, and K. Kumar, “Study of DDoS attacks using DETER Testbed,” researchmanuscripts.com, vol. 3, no. 2, p. 13, 2012. | spa |
dc.relation.references | R. Chertov, S. Fahmy, and N. B. Shroff, “Emulation versus Simulation: A Case Study TCP-Targeted Denial of Service Attacks,” in 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006., pp. 316–325 | spa |
dc.relation.references | C. D. Guerrero and M. A. Labrador, “On the applicability of available bandwidth estimation techniques and tools,” Computer Communications, vol. 33, no. 1, pp. 11–22, Jan. 2010. | spa |
dc.relation.references | C. D. Guerrero and M. A. Labrador, “Traceband: A fast, low overhead and accurate tool for available bandwidth estimation and monitoring,” Computer Networks, vol. 54, no. 6, pp. 977–990, Apr. 2010. | spa |
dc.relation.references | L. He, S. Yu, and M. Li, “Anomaly Detection Based on Available Bandwidth Estimation,” in 2008 IFIP International Conference on Network and Parallel Computing, 2008, pp. 176–183. | spa |
dc.relation.references | L. He, B. Tang, and S. Yu, “Available bandwidth estimation and its application in detection of DDoS attacks,” in 2008 11th IEEE Singapore International Conference on Communication Systems, 2008, pp. 1187–1191. | spa |
dc.relation.references | M. Alenezi and M. J. Reed, “Denial of service detection through TCP congestion window analysis,” in World Congress on Internet Security (WorldCIS-2013), 2013, pp. 145–150. | spa |
dc.relation.references | G. Carl, G. Kesidis, R. R. Brooks, and S. Rai, “Denial-of-service attackdetection techniques,” IEEE Internet Computing, vol. 10, no. 1, pp. 82–89, Jan. 2006. | spa |
dc.relation.references | “Multi-Generator (MGEN) | Networks and Communication Systems Branch.” [Online]. Available: http://www.nrl.navy.mil/itd/ncs/products/mgen. [Accessed: 10-Jun2014]. | spa |
dc.relation.references | A. Hussain, S. Schwab, R. Thomas, and S. Fahmy, “DDoS experiment methodology,” Proceedings of the DETER Community Workshop on Cyber Security Experimentation (Vol. 8), 2006. | spa |
dc.contributor.cvlac | https://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000457280 | * |
dc.contributor.cvlac | https://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000160326 | * |
dc.contributor.googlescholar | https://scholar.google.es/citations?hl=es&user=_YgBOOcAAAAJ | * |
dc.contributor.googlescholar | https://scholar.google.es/citations?hl=es&user=O7IQH-AAAAAJ | * |
dc.contributor.orcid | https://orcid.org/0000-0002-3286-6226 | * |
dc.contributor.orcid | https://orcid.org/0000-0002-2060-6419 | * |
dc.contributor.scopus | https://www.scopus.com/authid/detail.uri?authorId=57194112517 | * |
dc.contributor.researchgate | https://www.researchgate.net/profile/Angelica-Nino-Diaz | * |
dc.contributor.researchgate | https://www.researchgate.net/profile/Cesar-Guerrero-2 | * |
dc.contributor.researchgate | https://www.researchgate.net/profile/Wilson_Briceno | * |
dc.contributor.researchgate | https://www.researchgate.net/profile/Jorge_Parra_Valencia | * |
dc.subject.lemb | Ingeniería en ciencias de la computación | spa |
dc.subject.lemb | Gestión de documentos | spa |
dc.subject.lemb | Educación | spa |
dc.subject.lemb | Empresa | spa |
dc.subject.lemb | Educación en ingeniería | spa |
dc.identifier.repourl | repourl:https://repository.unab.edu.co | spa |
dc.description.abstractenglish | Denial of Service Attacks have had an increasing sophistication that demands new solutions from the scientific community. Intrusion Detection Systems use regular detection techniques by inspecting IP packet headers among different rules for each type of attack. A simpler approach presented in this paper is based on the available bandwidth estimation as a metric to determine the unexpected variation in the bandwidth consumption as an indicator of a possible DoS attack. Using a modified version of the tool Traceband, we show that is possible to identify different types of flooding attacks implementing criteria according to the states of the Markov Hidden Model used to establish available bandwidth estimation values. | eng |
dc.subject.proposal | DoS | spa |
dc.subject.proposal | Estimación de ancho de banda disponible | spa |
dc.subject.proposal | Detección ataques de denegación de servicio | spa |
dc.subject.proposal | Monitoreo de red | spa |
dc.subject.proposal | Traceband | spa |
dc.type.redcol | http://purl.org/redcol/resource_type/EC_AC | |
dc.rights.creativecommons | Atribución-NoComercial-SinDerivadas 2.5 Colombia | * |